NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
"My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for."
-- The Mentor The Hacker's Manifesto by The Mentor
Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
Batch File Potential by blip
Batch files can introduce directly executable code to a system, potentially malicious. How it is done with two different methods with a harmless, amusing example executable. Gives very little details on how to setup everything for those who would typically want to send someone a malicious executable unless they know how to setup the executable in memory, which I believe is highly unlikely.
Beginner's guide to hacking - LOD Good
Beginners Guide to understanding Unix
Beginners Hacking Guide (TI) #1
Beginners Hacking Guide (TI) #2
Bugs, Keyloggers, and Honey Pots: Who's Watching Your Ass on the Internet? by RW
The world of internet spying is changing rapidly. Not only are technical capabilities for surveillance developing, but many of them are being kept secret from the public so that people cannot take effective countermeasures.
Computer Crime Investigator's Toolkit by Ronald L. Mendell
What I've tried to do is devise a summary of basic, practical knowledge, "tricks," if you like, that should interest all computer crime investigators. While they may not be the final word in preparing for an examination, these techniques will provide some insight into the ways and means of computer criminals.
Concerning Hackers Who Break into Computer Systems by Dorothy E. Denning
A diffuse group of people often called ``hackers'' has been characterized as unethical, irresponsible, and a serious danger to society for actions related to breaking into computer systems. This paper attempts to construct a picture of hackers, their concerns, and the discourse in which hacking takes place.
Cyber Protests: The Threat to the U.S. Information Infrastructure by NIPC
Cyber protesters are becoming increasingly more organized and their techniques more sophisticated but, most likely, will continue to deface web sites and perform DoS attacks. There will also be an increase in the number of apparently unrelated hacking groups participating in the cyber protests. National boundaries will not always be clearly delineated in attacks on opposing organizations.
Draft Glossary of Communications Security Terms by COMSEC
ANI, CNA, LLLTV, SCIF...
Espionage in Information Warfare by Christopher D. Noble
All these definitions appear to call for some form of human action, but this is not an absolute. Spying is done by entities most capable with respect to the information being collected. In cyberspace, digital agents are far more effective as spies than humans.
Guide 4 beginning hacker
Hacker Being by Valerio "Elf Qrin" Capello
A hacker is a person that loves to study all things in depth (definition 1), especially the more apparently meaningless details, to discover hidden peculiarities, new features and weakness in them. For example, it is possible to hack a book, by using it to equalize the legs of a table, or to use the sharp edge of one of its pages to cut something.
Hacker's Dictionary
For those of you who always wanted to know what those terms used by hackers but never knew where to get them. Well, now you do! This thing has a shitload of info.
Hackers acronym chart
Hackers' Tricks to Avoid Detection by Chris Prosise and Saumil Udayan Shah
Hackers are not only clever in how they invade servers; they are also devious in how they disguise their attacks. Malicious attackers use a variety of evasive techniques, which we will examine in this column so that we, as administrators, can be better prepared to detect and respond to them.
Hackers, by Steven Levy 1984, a Project Gutenberg
Hacking Guide for Novices from Mentor/LOD (1989)
Hacking/Phreaking Reform by AyAn4m1
Why hackers are being attacked and what we need to do to fix the problem.
Hiding Crimes in Cyberspace by Dorothy E. Denning and William E. Baugh, Jr.
We address here the use of encryption and other information technologies to hide criminal activities. We first examine encryption and the options available to law enforcement for dealing with it. Next we discuss a variety of other tools for concealing information: passwords, digital compression, steganography, remote storage, and audit disabling. Finally we discuss tools for hiding crimes through anonymity: anonymous remailers, anonymous digital cash, computer penetration and looping, cellular phone cloning, and cellular phone cards.
Honeypot FAQ
They are a resource that has no production value, it has no authorized activity. Whenever there is any interaction with a honeypot, this is most likely malicious activity.
How Do I Hack? by j0662
It's a common enough question, asked on nearly every board across the web, and yet, no one seems to be able to answer it. Here is my atempt.
LOD/H's Novice's Guide to Hacking
Local Attack by draggie
This is a method for getting the local administrator password on a Windows NT/2k/or XP machine.
Malicious Data and Computer Security by W. Olin Sibert
Traditionally, computer security has focused on containing the effects of malicious users or malicious programs. However, as programs become more complex, an additional threat arises: malicious data. This threat arises because apparently benign programs can be made malicious, or subverted, by introduction of an attacker's data--data that is interpreted as instructions by the program to perform activities that the computer's operator would find undesirable.
Massive guide (complete I might also add) to hacki
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network by Anonymous
A decade ago, most servers were maintained by personnel with at least basic knowledge of network security. That fact didn't prevent break-ins, of course, but they occurred rarely in proportion to the number of potential targets. Today, the Internet's population is dominated by those without strong security knowledge, many of whom establish direct links to the backbone. The number of viable targets is staggering.
Nemesis: Tactical Guide to Web Server Infiltration by protonigger
If you picked a good target you should see plenty of exploits to choose from, and since this is an IIS server that you are exploiting, then you should be able to exploit most of the vulnerabilities with yourinternet browser (the simplicity of it all will astonish you).
Network Scanning Techniques: Understanding How It Is Done by Ofir Arkin
If the intelligence gathered shows a poorly defended computer system, an attack will be launched, and unauthorized access will be gained. However, if the target is highly protected, the hacker will think twice before attempting to break in. It will be dependent upon the tools and systems that protect the target.
Packet Attacks v2 by Dreifachx and Data_Clast
A true hacker is one who strives to attain the answers for themselves through curiosity. Its the path we take to those answers that makes us hackers, not destruction of other peoples work.
Password Cracking by Kitten
Cracking programs essentially mimic the steps taken by login verification programs. A login sequence is as follows. When a user enters a password at the prompt, the first step is to look up the salt value. So the program searches through the password file until it finds the user's login name, and converts the two characters representing the salt back into a 12-bit binary value.
Physical Penetrations: The Art of Advanced Social Engineering by Scott Higgins
The subject of physical security may come up after all the current day buzzwords for security have been thrown out. In actuality, physical security may not come up at all. When we think of physical security we visualize cipher locks, electric fences, huge vault doors, guards, and the like. These devices are intended to keep the unauthorized individuals out and keep the honest people honest, as the saying goes.
System Cracking 2k by protonigger
A comprehensive guide to the latest methods of network infiltration.
The Art of Port Scanning by Fyodor
This paper details many of the techniques used to determine what ports (or similar protocol abstraction) of a host are listening for connections. These ports represent potential communication channels. Mapping their existence facilitates the exchange of information with the host, and thus it is quite useful for anyone wishing to explore their networked environment, including hackers.
The Hacker's Ethics by Dissident
I went up to a college this summer to look around, see if it was where I wanted to go and whatnot. The guide asked me about my interests, and when I said computers, he started asking me about what systems I had, etc. And when all that was done, the first thing he asked me was "Are you a hacker?" Well, that question has been bugging me ever since. Just what exactly is a hacker? A REAL hacker?
The Hackers Handbook
The IIRG Hackers' Acronym Chart by The IIRG
In no way do we feel this chart is totally complete, but we feel its a good start for the novice or lazy hacker to quickly look up acronyms.
The Information Warfare Mania
The most obvious (and widely circulated) spin on the IW morass is to focus on the offensive and defensive manipulation of information systems and networks -- i.e., "hacking"
The Newbies Guide to Hacking and Phreaking by Terminal Killah
Hacking is not going into a system and destroying files and just fucking up some guys computer up. Hacking is going into AOL chat rooms and TOS'ing some kids ass. Hacking is not going into the IRC advertising and showing off what script or bot yer using. Hacking is not emailbombing, using programs, winnuking someone, using ICMP attacks on someone, or saying that you are a hacker.
The Social Organization of the Computer Underground by Gordon R. Meyer
This paper examines the social organization of the "computer underground" (CU). The CU is composed of actors in three roles, "computer hackers," "phone phreaks," and "software pirates." These roles have frequently been ignored or confused in media and other accounts of CU activity. By utilizing a data set culled from CU channels of communication this paper provides an ethnographic account of computer underground organization. It is concluded that despite the widespread social network of the computer underground, it is organized primarily on the level of colleagues, with only small groups approaching peer relationships.
The alt.2600 FAQ file on hacking, including loops,
Tracing E-mail
Sometimes people might send you information or hatemail from a fake address. This can be done quite easily simply by changing the "Sender" and "Return-to" fields to something different. You can do this, since these fields, i.e. your identity, are normally not checked by the mailserver when you send mail, but only when you receive mail.
Wardialing Brief by Kingpin
Wardialing consists of using a computer to dial a given set of telephone numbers with a modem. Each phone number that answers with modem handshake tones and is successfully connected to is stored in a log. By searching a range of phone numbers for computers, one can find entry points into unprotected systems and backdoors into seemingly secure systems.
Why Do We Hack? by Hex_Edit
Why do we hack? Is it to alter webpages and leave some type of cybergang inner-city graffiti? Is it to laugh in the face of over paid, under qualified sysadmins? Well for myself, and everyone I associate with, the answer to both of those would be no. So then, why do we do it?
lkm: Kernel Hacking Made Easy by Nicolas Dubee
Memory is divided into roughly two parts: kernel space and user space. Kernel space is where the kernel code lives, and user space is where the user programs live. Of course, a given user program can't write to kernel memory or to another program's memory area. Unfortunately, this is also the case for kernel code.
This page Copyright © 1997-2008 totse.com.
totse.com certificate signatures
Minggu, 13 Juli 2008
Langganan:
Posting Komentar (Atom)
Tidak ada komentar:
Posting Komentar